security (276)

This is a transcription of our interview with Liam Healy, SVP and Managing Director at Diligent about ESG, Legal Operations and CyberSecurity. 

You can watch the original video interview here or an audio podcast here. You are also welcome to subscribe to our podcast in all major podcast apps by searching "Risk Management Show".

8272620482?profile=original 

Boris: Welcome to our interview with Liam Healy. Liam is a SVP and Managing Director at Diligent, which is a market leading provider of the comprehensive Governance sof

Read more…

Free eBook: Common SAP security mistakes and how to fix them

 

Hi Global Risk Community member,

Maintaining SAP system security can be difficult.

SAP systems offer powerful security features to help find and correct system security violations. It is the responsibility of the developers, administrators, and emergency response teams to ensure system security is maintained and to review new code before it is moved into production.

However, even knowing about these tools,

Read more…

The emergence of smart homes and the consequent prevalence of smart home security cameras has been associated with consumer preference towards energy efficiency and optimum resource utilization. While smart homes are popular for these advantages, security cameras are witnessing a surge in their adoption as we see a rise in security issues in and around these homes. The advent of next-generation wireless technologies such as HVAC Controller, security and access regulators, and entertainment contr

Read more…

Security information and event management was initially designed to help organizations achieve compliance and keep their information compliant but has evolved over the years. Moving beyond its roots, software vendors now provide machine learning, advanced statistical analysis, and other analysis methods for your products for security information and event management (SIEM).

8028321266?profile=original

The SIEM and Threat Management evolution continues to build on a scalable open security platform that supports security and

Read more…

8028322493?profile=original

FranSec Virtual IT Security Conference launches on 24th – 25th June, uniting cyber security leaders from across the country to exchange in-depth knowledge and expertise towards safeguarding the nation’s Banking & Finance, Energy, FMCG, Agriculture, Manufacturing, Chemical & Pharmaceuticals, Automotive industries.

 

2019 was a record-breaking year for cyber-attacks in France. A staggering 67% of companies fell victim to malicious activity and with only 10% equipped to cope with them. As digitalisat

Read more…

Health care is focused on the use of innovation and connectivity in an age of digitization to advance the field. Smartphones, cyber networks, mobile devices, and interconnections can be used by healthcare providers to enhance patient care and quality of care.

8028322287?profile=original

As consumer requirements grow, health companies and technology giants have the opportunity to develope  mHealth applications. Through mobile health apps, players in the healthcare sector are searching for the ability to combine electronic he

Read more…

Are you newly working from home? Or are you an old pro? Either way, it is likely you are using some form of remote desktop protocol. Those of us who have been working home as our primary means of earning a living, know these tools very well and are accustomed to eliminating the various distractions in our home environment in order to get the job done. There are some precautions to be aware of.

None of us think that we are going to get hacked, even though we have seen time and time again that it i

Read more…

Once again, tax time has rolled around, and though you technically have until April 15th, it’s always best to file a bit earlier…especially if you want to avoid setting yourself up for ID theft.

How Could Filing Taxes Compromise Your Identity?

Here’s how you could become a victim of ID theft just by filing your taxes: the first method is that a thief uses your Social Security number to file taxes, and then they steal your refund. The second method that they use is they take your Social Security nu

Read more…

Hey YOU, SMB, yeah I’m talking to you. There are a number of things that you can do to not only protect your personal information, but also the information you have in your business:

  1. Hire a professional  It is entirely possible the small business was hacked because they did not employ technicians to prevent it in the first place. Therefore 3rd parties that specialize is security and breach mitigation should be contacted immediately. These IT security professionals specialize in containment. Thei
Read more…

You might not realize it, but your electronic devices may be tracking you. They know what you are doing, what you are reading, and the things you like to do. In almost every case, you give these devices permission to collect this info when you start using them. Here are some tips to help you prevent your devices from spying on you:

Laptops

Macs

If you are using a macOS computer, you can limit the information you are sending to Apple by choosing the Apple menu > System Preferences > Security & Priva

Read more…

You have likely heard of the dangers of using unsecure public Wi-Fi, so you know that hackers are out there snooping. It is pretty easy to hack into a laptop or mobile device that is on a public Wi-Fi connection with no protection. Hackers can read your emails, steal passwords, and even hijack your website log ins.

Let’s imagine that you are in a local coffee shop with your laptop. All someone has to do is download a wireless network analyzer, which usually has a free trial, and with the right ha

Read more…

Your Uber Driver May be a Criminal

Do you Uber? If you do, you probably feel pretty safe getting into the car of a stranger. However, you might not be as safe as you think.

Most people take for granted that Uber does background checks on its drivers, but there are actually a number of shady drivers who have recently been accused of crime, and it’s definitely not the first time they have had run ins with law enforcement. Some of these people are accused of committing crimes against their passengers, and that’s where things really g

Read more…

8028308088?profile=original

In the age of rapid technological progress, where Digital Transformation has become pervasive, business applications are getting increasingly complex and interconnected.  The advancement in technology has also helped attackers get more aggressive and inflict more damage to IT systems and applications.  Application security tools and techniques are evolving too, yet most organizations still fall prey to vulnerabilities.  Cybersecurity has become a bigger threat than ever before.

The current applic

Read more…

Quick and Dirty Disaster Prep Guide

How prepared are you for a disaster? Most of us are not prepared, at all, yet two-thirds of us live in an area where we are at a moderate to very high risk of experiencing a natural disaster. Here are a few things you should do, today, to start preparing for a “just in case” situation:

Be Aware

Think about your home and where you live. What disasters are likely to occur? Fire, of course, could happen to any of us, and statistics show that there is a 25% chance that you will experience a major fire

Read more…

Most of us have no idea when a disaster is about to strike, and even if we do have a little warning, it’s very possible that things can go very wrong.

This is where you can put a business continuity plan to good use. What does this do? It gives your business the best odds of success during any disaster.

What Exactly is Business Continuity?

Business continuity, or BC, generally refers to the act of maintaining the function of a business as quickly as possible after a disaster. This might be a fire,

Read more…

A Guide to How Hackers Hack

You have surely heard of hackers, but do you really know how they work? Hackers are well known for being bad guys, though there are certainly good hackers out there too. Here’s a brief guide to help you understand how a hacker can hack:

The-Dark-Web-Black.jpgDirections for Hacking are Easy to Come By

Hackers don’t have to look far for help, especially if they don’t know much about hacking. First is a well-known website known as Kali Linux. It has a ton of tools available for hackers, and the site features many links to

Read more…

SIM Swapping: What You Need to Know

Have you heard of SIM swapping? It’s a new trick that hackers are using to get money and mess up your life.

What is SIM Swapping?

So, what is SIM swapping? It’s when a hacker tricks your cell phone company into thinking that you have activated your SIM card on another phone. In other words, the hackers are taking your phone number and then associating it with a different SIM card. If the switch is a success, your device will be deactivated, and all of your phones, texts, data, and more will come t

Read more…

You might be surprised to know that more than 3.4 billion fake emails are sent around the globe each day. What does this mean? It means that almost every company out there is vulnerable to cybercrimes in the form of “spoofing” and “phishing.” On top of this, most companies out there have not protected themselves from this type of cyber attack. What’s even more interesting is that the vast majority of these emails are not coming from some foreign land, but they are coming from sources based in th

Read more…

How crucial is a security paper?

8028303500?profile=original

Security papers have been used in security printing. The papers include features which is used to differentiate or authorize a document as original, like watermarks or invisible fibers or features that show evidence of fraud in attempting. For example, it can be used to delete or alter printed materials such as quantities or signatures on a report. Sources of such documents are those used to classify documents such as passports and certificates. These include birth certificates and various types

Read more…

DoorDash has admitted that it has been the victim of a data breach, which has affected about 4.9 million merchants and people.

In a recent blog post, DoorDash announced that it noticed some odd activity early in September from a third-party service. After looking into it, the company found that an unauthorized third party was accessing user data from DoorDash on May 4, 2019. DoorDash immediately took steps to stop any future access and to improve security.

Those who were affected by this breach jo

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!